<<

WHITE PAPER

MISSION CRITICAL: MANAGING MOBILE.. APPLICATIONS & CONTENT.. Moving beyond mobile device management to MAM and MCM is essential for delivering on the promise of mobility.

Executive Summary , tablets and other mobile devices have Table of Contents become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of workers raised 2 The Mobile Landscape on mobile technologies. Consumer devices and bring-your- own-device (BYOD) programs are driving a new wave of 3 Mobile Device Management business process innovation, changing the way customers, employees and partners interact with organizations and 5 Mobile Application Management with each other. In fact, mobile devices and applications are catching up with — and in many cases surpassing — PCs in the 6 Content Management quality and functionality of their applications. 8 CDW: A Mobility Partner That Gets IT Mobility is changing the way health providers work with patients and the way retail organizations, banks, airlines and even car rental companies serve their customers. Increasingly, mobile applications and mobile-enabled business processes are giving enterprises a competitive edge. For example, any bank that doesn’t offer today is at risk of losing customers to competitors. This trend is affecting government at all levels as well, giving federal, state and local agencies greater capabilities for delivering services to citizens and accomplishing their missions.

SHARE THIS WHITE PAPER 2 MOBILE APPS & CONTENT MANAGEMENT

Enterprises are struggling to keep up, not only with the end systems. Such capabilities are enhanced even further by demand for new mobile applications, but for ways of managing linking them to a mobile device’s camera and GPS capabilities, and securing valuable data and resources in the face of this which can be incorporated into fleet management systems for mobile explosion. tasks such as tracking drivers and updating route information.

Just as quickly, the focus of enterprise management and Law enforcement officers and other government officials security is shifting from managing and protecting huge have found numerous ways to make use of the enhanced numbers of organization-issued and personal mobile devices portability, quick boot-up and access to back-end information to managing and securing the enterprise applications and from tablets and smartphones. For example, officers can information they hold, sometimes even in place of managing access arrest records and mug shots more easily during traffic the devices themselves. Any organization that wants to take stops. And a plain-clothes officer at a gun show can check this full advantage of mobile devices and applications must plan information more conspicuously with a tablet or a . on developing a strategy and deploying the technology to Healthcare workers also have expressed tremendous interest manage and protect its mobile devices, applications and data. in tablets. Doctors and nurses use tablets and smartphones to access patient record systems and imagery from the bedside The Mobile Landscape or to enter patient information directly into electronic medical The inundation of mobile devices in the workplace has changed record (EMR) systems. They also can respond directly to how business is done. According to a November 2013 study patients’ requests for information. from the technology research and analysis firm Forrester, Workforce Personas and the Gap, almost half of the information workforce carries a smartphone to work, Application & Content and 18 percent of workers carry a tablet, numbers that have Management Privacy increased dramatically in recent years. Privacy is a primary consideration for organizations In a late 2013 study, Global State of Enterprise Mobility: deploying mobile device, application and content A Look to the Past, Present & Future, the Enterprise management, especially if mobile devices are also used for Mobility Exchange, an online community for global mobility personal purposes and contain personal content. The role professionals and business leaders, reports that 44 percent that user privacy plays in the growing BYOD movement is of mobile practitioners surveyed have invested in mobile evolving rapidly and has yet to be resolved completely. applications, 40 percent in BYOD programs and 32 percent in Questions abound: What right does an enterprise have mobile management. The study also shows that more than half to monitor a user’s personal device, including personal of organizations surveyed plan to invest at least $250,000 in activities, location movements, contacts, web history, mobility solutions over the next 18 months. social networks, , application downloads, photos and even bank statements? What right does it have to wipe this Why? More than 70 percent of practitioners cited increased content from the device or create a forensic image when a productivity due to mobile technologies, and almost half security breach has been suspected? How can organizations cited improved operational efficiency. It’s clear that mobile expect users to report device theft or breaches when they devices and applications bring great benefits to organizations, know it might mean that their personal data, applications as well as workers. and photos will be wiped?

Mobile devices, applications and wireless connectivity Court decisions and regulations such as the Stored help users stay connected to the office at all times, Communications Act have begun to affect these issues, allowing them to collaborate, participate in decision- but the ultimate result isn’t clear. What is clear is that these issues will have profound implications for making and handle customer issues from wherever they and management. happen to be. The benefits are increased productivity, enhanced customer relations and faster time to market, all clear competitive advantages in the perpetually Aside from changing the way mobile workers interact accelerating business environment. with their organizations, mobile devices are changing the Aside from collaboration and connectivity to email and social way customers, clients and partners interact with these networks, mobile devices and applications help streamline organizations as well. and accelerate business processes, particularly when mobile Most of these mobile capabilities come not so much from the users employ applications that have direct access to back-end devices themselves but from the applications running on them. enterprise systems and information. It’s these apps that have become so important and so much of Sales and field workers use mobile devices and applications to a differentiator among today’s enterprises, with many hard- keep pace with information such as recent leads, pricing and pressed to keep up with mobile application demand. In fact, job scheduling, as well as to log information directly into back- many enterprises are now taking a “mobile-first” approach 800.800.4239 | CDW.com 3 to new applications and features rather than incorporating and has since expanded to offer management of other devices mobility as an afterthought. as well. And major desktop management vendors, such as LANDesk and Altiris, started integrating MDM capabilities into Mobile IT Challenges their desktop management solutions. Many of these solutions The challenges of incorporating mobility in the enterprise have progressed beyond device management, adding are considerable, especially with the growth of BYOD capabilities to manage mobile applications and content. programs that allow users to mix personal information with Common mobile device management features include: work-related applications and content on the same device. Users are also bringing their own mobile applications and Mobile device discovery and asset management: Most cloud services as well. MDM packages are able to detect new devices attempting to connect to the enterprise network. After devices are With the help of content management , many users approved, enrolled and provisioned, MDM solutions can are not only accessing back-end email systems, but also monitor and inventory the devices and applications databases and files, possibly leading to sensitive information stored on them. being stored on a personal device. Some users are also taking advantage of consumer-oriented file-sharing and Enrolling and provisioning new devices: Every MDM solution synchronization services such as Box and Google Drive to includes the capability for IT staff to enroll new user devices take their work with them, which can challenge strict security and connect them to the network. Most management policies and regulations. solutions integrate with Microsoft Active Directory and allow users to self-enroll their devices so they don’t have to wait for Unfortunately, mobile devices can be lost or stolen, possibly IT staff to get around to it. IT managers can create the policy, placing the sensitive data they contain in the wrong hands. settings and provisioning profile for each user, and users can Many of the most serious customer data breaches have been quickly enroll devices through an enterprise portal and receive the result of lost or stolen notebooks and mobile devices. their profile and settings, all in a matter of minutes. Further, the use of personal email, applications and web Credential and password management and single browsers can expose an organization to malware, not only sign-on: MDM solutions provide centralized management on users’ devices, but also on the network to which users and enforcement of device logins, personal ID numbers connect. Malware is often used to initiate network intrusions, and account passwords, preventing lost or stolen devices data theft and advanced persistent threats that can sit on from easily being accessed. Most can provide two-factor a network for months, stealing an organization’s valuable authentication and controlled single sign-on access to intellectual property. enterprise applications and information. IT departments also face serious management challenges, Application whitelisting and blacklisting: One of the hazards such as: of connected mobile devices comes from users downloading • how to detect rogue, unapproved devices on the network applications that can be dangerous to the network because • how to provision, update and manage mobile users and of malware or unapproved access to other applications and devices across their lifecycle data, such as contacts and calendars. By allowing the IT team to blacklist unapproved applications or limiting applications how to prevent users from leaving the organization with • to those that are specifically approved (whitelisting), MDM sensitive and proprietary information, particularly if they’re solutions can reduce the hazards of mobile apps. using file-sharing services meant for the consumer App stores: Another way MDM allows an IT department Mobile Device Management to offer application choice while keeping careful control over users’ applications is to provide an internal enterprise Many IT departments have sought to address the challenges app store (think Apple’s iTunes store or Google Play but of the mobile enterprise by deploying a mobile device without the transaction process). The app store offers only management (MDM) solution. MDM solutions incorporate applications and, in some cases, cloud services that the many of the features used to manage notebook and desktop organization has specifically approved. Once users have PCs, such as device discovery, provisioning and lifecycle been connected and provisioned, IT staff can limit application management. MDM adds other features that account for the access to the app store. special hazards introduced by mobile devices, such as device loss and theft. Those features include password protection, Encryption and virtual private networks (VPNs): MDM remote wiping and encryption. solutions can centralize the management of device encryption to protect sensitive data on the device and provide VPN Leading MDM vendors include MobileIron, AirWatch by tunneling to the enterprise network with robust over-the-air VMware, Citrix Xenmobile and MaaS360 by Fiberlink. encryption. A relatively new feature of some MDM programs BlackBerry developed an enterprise solution for its devices is the provisioning of per-app VPNs or “app wrapping,” which 4 MOBILE APPS & CONTENT MANAGEMENT

ensure that a VPN connection is made for a specific application transmission each time it connects to the enterprise, providing Mobile Application Alternatives more fine-grained security and control than a VPN that spans Mobile application development can be a complex affair, the entire device. thanks to the variety of operating systems and capabilities of mobile devices. Clearly, tablets have different capabilities Policy enforcement: An MDM solution also can allow the than smartphones when it comes to power and displays, and IT department to apply and enforce mobile device policies, profound differences can be found among products in the settings and controls, based on user, group and role, including same mobile category. Each application development choice application and encryption controls. Other policies can limit has its pros and cons. or prevent jailbroken and rooted devices from connecting to Third-party applications: These apps can be deployed the network (because these devices are more likely to have and updated with little or no development and are a good security hazards than others), and also disable Wi-Fi, device first choice if an organization doesn’t want to waste cameras, GPS, and other potentially hazardous development resources or doesn’t have them in-house. features. Network access controls can also check devices However, organizations may not get the exact features and to ensure they conform with all policies and updates before capabilities they want from a third-party app, nor support allowing them to connect to the network. for all the operating systems, platforms and versions their Device lock and wipe: Loss and theft, which can give outsiders devices use. access to sensitive information stored on a device or on an applications: These apps often provide good organization’s network, represent some of the most serious cross-platform support, but the user experience may be security hazards of mobile devices. Another hazard is workers slow and unsatisfying, defeating the purpose of providing who take their mobile work devices with them upon leaving the application in the first place. the organization. HTML5: This approach provides a good hybrid solution with the cross-platform benefits of web applications and the Most MDM solutions allow IT staff to centrally manage the device-specific customization that can improve the user capability to lock a device remotely so it cannot be accessed experience. However, HTML5 apps probably won’t perform or to completely wipe all data and applications from the device. as well or have a user interface as satisfying as an application Newer features that take BYOD programs into account can developed natively from the ground up. perform a partial wipe of enterprise applications and data after Developing native applications: Taking this route can provide a user leaves the organization. the best user experience but can also be complex and Monitoring, reporting and analytics: MDM solutions allow demand significant resources if more than one operating centralized monitoring of devices and users, including system and device must be supported.

connectivity, application downloads and use, and other Porting: Running application code across devices and functions. They can produce a variety of analytics and reports operating systems is often easier than developing natively that can help the IT shop with getting a handle on mobile from scratch, but the result may not be as satisfying as security, upgrading requirements and other issues involving an application developed from the ground up for a specific planning for the future. device or OS.

In recent years, many mobile enterprises have incorporated Application virtualization: This approach may be the quickest MDM into their management arsenal, and MDM offerings have way to provide access to current applications from mobile become increasingly commoditized. A new category, called devices, but, as with web applications, the user experience enterprise mobility management (EMM), incorporates MDM may not be up to par on a device without the power, display and mouse capabilities the app demands. but also emphasizes management of device applications and content in addition to the device itself. The choice among these options depends on the needs, skills, budget, devices and usage of the organization. Going Ape for Apps

While MDM is a powerful tool in the mobile management bound to encounter stiff resistance and obvious legal issues if arsenal, it doesn’t solve all or even most of the issues they try to prevent BYOD employees from using social media confronting mobility deployments. Why? Because the era of or other favorite applications that may present security the IT department having tight control over user devices and hazards. And if users know that their family photos will be applications in the workplace is over. Organizations recognize wiped after a certain number of failed logins, or if the device that they can’t limit users to devices and applications less is suspected of being lost or stolen, they likely won’t report capable than the ones they’ve grown accustomed to using these types of incidents. every day in their personal lives. That’s why, while MDM is still considered an important tool It’s also true that BYOD isn’t truly BYOD if the enterprise exerts for managing mobility in the enterprise, many organizations tight control over a user’s personal device. Organizations are are moving away from tightly managing devices and simply 800.800.4239 | CDW.com 5 blacklisting or whitelisting applications. They are providing maximum BYOD freedom while protecting applications and The Cloud Alternative information. These objectives are accomplished by deploying Enterprise mobility management solutions are available solutions in two emerging enterprise mobility management from a variety of vendors and service providers. For smaller categories: mobile application management (MAM) and mobile businesses or any organization that just wants to get up and content management (MCM). running quickly, cloud EMM solutions provide a viable option. The advantages of a cloud-based EMM implementation Mobile Application Management include rapid deployment, little to no upfront cost, no need for internal oversight of mobile device management MAM overlaps with MDM but focuses on the enterprise mobile hardware and software, potentially low monthly costs, easy applications that reside on the device, rather than the device scalability and global access. itself. Some observers view the mobile device and application Whether an organization chooses an on-premises or cloud landscape of today as resembling the Wild West, with a MAM alternative usually depends on the budget, expertise and solution as a fort protecting enterprise apps. resources it has at its disposal, as well as the compliance Once users are allowed to bring in their own devices, and security requirements it must meet. For government, applications and cloud services, two effective ways to protect financial and other high-security organizations, anything the organization’s applications and data are to either wall them less than an in-house EMM solution with complete control off inside a secure container on the device (containerization) by the IT department may be unacceptable. However, in many cases, a cloud service may be able to provide better or app wrapping. Both approaches offer a way to protect management, security and content protection than its enterprise apps from interacting with other apps on the device. potential customer. In order to balance the privacy and flexibility needs of the user with the management and security needs of the enterprise, certain applications and are free to pick and choose from the a mobile application management solution need not even rest. Many of these applications may be downloaded with provide IT staff with visibility into the personal side of a device. specific settings as well.

Enterprise app stores are the key delivery feature of most The second essential aspect of application management is MAM solutions, providing a catalog of links to approved centralized control over the behavior of the organization’s applications, many of which have been enabled with managed mobile applications, based on management and management and containerization or app wrapping features. security policies configured by the IT department. Such The catalog may vary for each user based on his or her identity, policies can include robust encryption for all enterprise group, role or privileges. application data stored on the device and deployment of The user interacts with the app store when accessing the an application-specific encrypted VPN every time the app secure enterprise container on the device. Otherwise, the user attempts to connect to the enterprise. These settings may is free to access the applications he or she wishes to install on also include application-specific policies regarding the use of the device’s personal side. Applications that reside outside the GPS capabilities, cameras and other device-specific features, container cannot access or affect applications and data within, as well as controls over application interactions and data- including contacts, calendars and other sensitive information. sharing with other apps on the device.

Most enterprise app stores require some form of user Typically, managed applications interact with a mobile authentication and authorization, usually tied in with Active application management solution that allows the IT Directory or some other enterprise directory or identity department to apply these policies. management component. App stores often provide a mix of Managed applications can be provided in several ways: applications developed in-house and third-party applications Browser or email-based from MAM solution providers: with controls applied by the organization, as well as third- They typically offer secure, sandboxed web browser and party applications that security administrators have deemed email client alternatives to the native applications on the to be safe. device. The goal is to provide a user experience similar to the Ideally, an app store can integrate with Apple’s Volume email or web browsing apps native to the device, while allowing Purchase Program and other enterprise licensing programs. IT administrators to apply polices and controls that protect the This allows IT administrators to use the MAM solution to organization’s applications and information. These controls manage access to redemption links and codes for iOS software include multifactor authentication, app-specific VPNs, web that the organization purchases. browsing restrictions and policies to prevent data leakage.

Some enterprise app stores provide access to approved cloud Some MAM solutions also provide an enterprise-ready software services, such as Salesforce.com, as well as virtual alternative to cloud-based file-sharing and synchronization applications. Users may be required to download and install solutions, such as Box. These require not only enterprise 6 MOBILE APPS & CONTENT MANAGEMENT

authentication, but also VPNs and on-device encryption. They For example, Samsung Knox is an enterprise-level also provide IT administrators with the ability to eliminate management platform that Samsung provides for its own user access to enterprise files if the device is lost or if the user Android mobile devices. It offers containerization via a dual- leaves the organization, and the ability to wipe any relevant persona architecture. Knox provides its own application files on the device. programming interfaces (APIs) to create a secure work container on the Samsung device for enterprise applications Software development kits: Applications built from the and data. This platform also implements data encryption that ground up internally, using a MAM vendor’s SDK, have a secure complies with Federal Information Processing Standards layer that allows the IT department to apply policies to an (FIPS) 140-2 and offers malware protection. application’s use via the vendor’s MAM solution. Applications developed through this process can be maintained for internal Administrators can harness MAM solutions that take use only or go through a vendor certification and approval advantage of APIs to control interactions between a device’s process and be provided to other organizations via the vendor work and personal environments. Knox provides its own app store. cloud-based device and application management solution as well. Some third-party MAM solutions also provide integration Vendor wrap: The MAM vendor may provide a tool that wraps with Knox. the MAM policy enablement feature around an existing application. In order to do this, the IT department usually BlackBerry provides a similar dual-persona secure container needs access to the app binary, so it won’t be possible to apply technology, for both its own devices and for Android and wrapping to most native or third-party applications available iOS devices, as well as via its BlackBerry Enterprise Service on the device or via public app stores. 10 software. Apple iOS 7 also provides similar dual-persona features that can be used by MAM solutions. Other solutions Partners: Organizations working with the MAM solution employ a hypervisor on the device to create separate virtual provider can offer apps developed through the SDK or that machines for work and personal applications. have applied a wrapping capability to their applications. Whatever the technique, MAM allows users to employ Third party: Some applications are available from third-party personal mobile devices with the freedom they’ve always enterprise software vendors with policy configuration features had, while providing the enterprise with the security and built in and need no MAM platform to apply those policies. management its mobile applications require. CDW’s App Marketplace Content Management Any organization looking to develop or acquire mobile Application and content management overlap. However, applications should take a close look at CDW’s App content management focuses on the content stored on the Marketplace. It’s a powerful app development resource device, as well as the device’s access to back-end enterprise that includes a comprehensive library of resources and information, including expertise on application strategy, information. Content management capabilities include design, development, testing, distribution, security, support enterprise authentication, as well as encryption of content at and analytics. It even includes lists of questions to consider rest and in transit via an app-specific VPN. in developing an app strategy. Mobile content management also encompasses enterprise Perhaps even more useful is CDW App Marketplace’s direct alternatives to consumer file-sharing applications and access to leading enterprise mobile app solutions and services, empowering workers with secure access to such the developers that created them, organized by industry resources. An effective content management solution offers and app functions. Organizations can also connect with the capabilities and user-friendly interfaces of consumer CDW’s account managers and seasoned mobile application file-sharing and synchronization solutions such as Box, while partners, all of whom have been screened and vetted providing powerful enterprise security and management extensively to ensure they can deliver the best mobile controls. application solutions with the least hassle. Any enterprise can harness this valuable resource to get up to speed These MCM solutions may use existing enterprise repositories, quickly, mobilizing and transforming business processes for with connections to SharePoint, WebDAV and file servers. Or competitive advantage. they may provide cloud repositories or links to other cloud services such as Box or Google Drive. In all cases, they allow The obvious challenge with mobile application management is IT administrators to apply a number of data leakage controls providing managed applications to users and devices running while still empowering employees with the latest information different mobile operating systems. Google Android and Apple needed to do their jobs. iOS have different management and security capabilities built Some also offer content searching, versioning and other in. In the case of Android, some third-party platform vendors features of classic content management systems, as well supply their own management capabilities. as viewing of content stored in many different file formats. 800.800.4239 | CDW.com 7

They may also offer robust multifactor authentication and Watermarking: This feature can be applied to documents to encrypted connections. discourage screen shots.

Geographical restrictions: This takes advantage of location ROI: Control vs. Enablement services and allows content to be opened only within a certain geographical range, depending on its sensitivity. How does an IT administrator calculate the return on investment of an enterprise mobility management Cutting and pasting: These features manage the removal or deployment? For many organizations, ROI may be difficult reuse of text or images from sensitive files to email messages to quantify. One could think of security ROI, where the or other documents. avoidance of a major mobile security breach could potentially Locking or wiping: This secures container content if the device save an organization thousands or even millions of dollars. is lost or stolen, the user leaves the organization or after a Many of the security breaches of the past few years predetermined number of failed logins. have come from stolen or lost mobile devices containing employee ID and credit card information. The costs in Secure browser and email policies: These allow links in email lost productivity and customers, remediation, customer or content to be opened only in a secure enterprise-provided notification, lawsuits and compliance fines can be steep. browser. Attachment restrictions can be applied to enterprise Simply avoiding one breach could potentially pay for the email to permit only links to shared content files, rather than entire solution and more. allowing attachments in the . This not only offers better However, enablement is the other side of ROI. Mobile security, but it also can save storage capacity if email with the devices and applications enable business process same attachment is sent to multiple recipients. innovations, customer relations improvements and Synchronization: This control allows syncing to take place only competitive advantages that can deliver significant over secure Wi-Fi connections, a measure that also can help results in revenues, profits and time to market. A well- managed mobile deployment can empower IT shops and control connection costs. staff to take full advantage of these benefits safely. And, Monitoring and reporting: These features give administrators with centralized provisioning and management, users are insight into content usage. The best MCM solutions provide up and running, connected to enterprise applications and the ability to oversee how much and what type of content is content with their new devices much more rapidly than being accessed by which users, as well as any changes made in would otherwise be possible. content folders, categories, etc.

Mobile content management continues to evolve. Among Depending on the capabilities of the MCM solution, along with the emerging features that vendors are delivering: content the and platform involved, mobile expiration dates; content push based on factors such as content management data leak prevention policies can be geographic location, relevancy and usage; and integrated configured to control: content collaboration tools.

Open in: This feature restricts the applications that can be Mobile content management also includes granular data used to open and read files containing sensitive enterprise access controls applied to any device that connects to back- information. If a secure container is created on the device, end enterprise databases and other information repositories the MCM solution can be configured so that only applications based on user identity, group, role, device and application. included as part of the secure enterprise container can be used Some EMM solutions provide these types of access controls, to open files. Or the solution simply may not allow them to be which also may be available via an application delivery opened on the device at all. controller solution, such as Citrix NetScaler.

Editing: This feature controls modifying mobile content Many incorporate access controls to ensure that a device delivered from the secure content sharing solution. has the latest application, operating system and anti-virus updates before it is allowed to connect to enterprise resources Downloading: This feature allows the saving of and access content. These controls also may restrict reading, specific documents. writing, printing, saving and other actions based on location Printing: This manages the printing of files stored on the and device factors. device, which can be allowed or prevented depending on the Enterprise mobile management is a rapidly evolving practice user and the content. that is moving away from device management and toward Saving: This controls file access when the user is offline. application and content management, with more precise tools and capabilities emerging regularly. MOBILE APPS & CONTENT MANAGEMENT 800.800.4239 | CDW.com 8

CDW: A Mobility Partner The CDW approach includes: • An initial discovery session to understand your goals, That Gets IT requirements and budget Enterprises face challenges in mobilizing employees. That’s An assessment review of your existing environment and where CDW can help quickly roll out mobile technologies. • definition of project requirements CDW maintains partnerships with leading wireless vendors, including network providers and device manufacturers, to • Detailed manufacturer evaluations, recommendations, offer a complete line of IT products and services. future design and proof of concept We offer a one-stop shop of integrated mobility solutions • Procurement, configuration and deployment of the consisting of software, hardware and cellular wireless final solution activation services. Regardless of the mobile platform users • Ongoing project measurements to meet service-level choose, CDW’s dedicated experts can step in to help with agreements (SLAs) activation and configuration services. CDW account managers Complete product lifecycle support and solution architects are ready to assist with every phase of • choosing and leveraging the right mobility solution. • Consolidated device and solution management platform Working with your CIO, management team or IT department, we can design, plan, implement and support comprehensive mobile solutions built around your organization’s needs.

To learn more about CDW’s mobility solutions, contact your CDW account manager, call 800.800.4239 or visit CDW.com/mobility

Citrix XenApp is a Windows application delivery system that manages applications in the data center and delivers them as an on-demand service to users anywhere. XenApp reduces the cost of application management, increases IT responsiveness when delivering an application to distributed users and improves application and data security. CDW.com/citrix XenApp enables organizations to improve application management by: • Centralizing applications in the data center to reduce complexity and lower the cost of desktop management by up to 50 percent • Controlling and encrypting access to data and applications to improve security • Delivering applications instantly to users anywhere on any device • Simplifying and automating the process of delivering or updating applications, enabling IT to focus on strategic initiatives

SHARE THIS WHITE PAPER

The information is provided for informational purposes. It is believed to be accurate but could contain errors. CDW does not intend to make any warranties, express or implied, about the products, services, or information that is discussed. CDW®, CDW•G® and The Right Technology. Right Away® are registered trademarks of CDW LLC. PEOPLE WHO GET IT™ is a trademark of CDW LLC. All other trademarks and registered trademarks are the sole property of their respective owners. Together we strive for perfection. ISO 9001:2000 certified 145520 — 140620 — ©2014 CDW LLC